Balancing The Pwn Trade Deficit – APT Secrets in Asia
Sneaky PDF
Three Generations of DoS Attacks
Jugaad – Linux Thread Injection Kit
Runtime Process Insemination
Familiarity Breeds Contempt
UPnP Mapping
Kernel Exploitation Via Uninitialized Stack
Owned Over Amateur Radio: Remote Kernel Exploitation in 2011
Assessing Civilian Willingness to Participate in On-Line Political and Social Conflict
Traps of Gold
Hacking Google Chrome OS
Hacking .Net Applications: The Black Arts
Get Off of My Cloud: Cloud Credential Compromise and Exposure
Metasploit vSploit Modules
Sounds Like Botnet
VoIP Hopping the Hotel: Attacking the Crown Jewels through VoIP
Fingerbank - Open DHCP Fingerprints Database
Pillaging DVCS Repos For Fun And Profit
This is REALLY not the droid you're looking for...
Cellular Privacy: A Forensic Analysis of Android Network Traffic
Seven Ways to Hang Yourself with Google Android
Getting SSLizzard
Mobile App Moolah: Profit taking with Mobile Malware
Hacking the Global Economy with GPUs or How I Learned to Stop Worrying and Love Bitcoin
Beat to 1337: Creating A Successful University Cyber Defense Organization
Deceptive Hacking: How Misdirection Can Be Used To Steal Information Without Being Detected
Introduction to Tamper Evident Devices
Hacking MMORPGs for Fun and Mostly Profit
Steal Everything, Kill Everyone, Cause Total Financial Ruin!